Skip to content

Blogs on DDI for Network Automation & Network Security

DDI (DNS-DHCP-IPAM) is foundational for managing apps and networks on-prem and in clouds. It simplifies network management, strengthens security, and enables automation. Read how Smart DDI enhances business continuity & UX, speeds up time to revenue, and improves compliance.

Network Security for Higher Education: The Key Role of DNS

Last year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS as an attack target or a vector. IDC’s 2022 Global DNS Threat Report shows that 84% of schools and universities were victims of DNS attacks in the past 12 months. The report then goes on to provide recommendations on how...

DNS RFCs: The Elephant in the Room – Part 1

DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an “RFC” The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...

DNS Security for Healthcare: Controlling Connected Devices and Protecting Patient Data

Over the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...

SD-WAN: Why DDI is Key for Efficient Management

As published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Let’s review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...

How to Secure Anywhere Networking with DNS: 2022 Threat Report Highlights

As organizations adopt a “work from anywhere” approach, IDC’s 2022 Global DNS Threat Report confirms that the frequency and damage cost of DNS attacks have remained as high as ever, causing severe impacts on service continuity and data confidentiality for on-premises, cloud, and remote workers. On the positive side, the importance of DNS for overall network security is being increasingly acknowledged, with organizations understanding its criticality for strengthening resilience, protecting data privacy, and for providing an early security barrier by...

Enhancing Visibility & Control Over Google Cloud Platform with IPAM Sync

Today, workloads are deployed on in-house DC or Public Cloud (Hybrid Cloud) or even in various Public Cloud Providers (MultiCloud). This brings new challenges for Netops and SecOps teams to build an accurate and consolidated Visibility on the Hybrid Cloud and Multicloud Infrastructures they are in charge of, so they require a Network Source of Truth (NSoT) for administration, operations and security purposes. An IPAM is meant for planification and reference purposes. It is used as a blueprint of the...

Access Control via DNS Applied to Parental Control

More and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...

Hybrid Workforce: Who’s Managing DNS?

Post pandemic situation sees the confirmation of working from home but also working from anywhere. After COVID-19, 92% of eligible people expect to work from home at least 1 day per week, and 80% expected to work at least 3 days from home per week according to a survey by Owl labs. Most enterprises seem to accept this new paradigm as it improves the overall productivity of the workforce. Provided the logistics of working outside the Enterprise can be addressed,...

Why IPAM Repository is the Key Enabler for Network Automation

Nowadays, things are moving quickly and nothing is set in stone. The same is true for IT and networking services. Today, deploying applications or websites must be done quickly for faster Time-to-Service but in addition, must be done as many times as required to account for the necessary functional upgrades or mandatory security patches. So, most of the mundane IT and networking tasks must now be thought of in terms of cycles with their seasonalities and not as a one-off...

Cybersquatting: The Basics Part 2 – How to Protect Yourself

In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On a Kali distribution, one can find a number of ready-to-use tools for typosquatting.Among these tools, “urlcrazy” is probably the best known. It is a very powerful tool, which from a domain name is able to generate other domain names with strong similarities and test their...

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...